Existing Patterns
Modified with Enhanced Material
|
CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 |
Blind SQL Injection |
CAPEC-9 |
Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 |
Buffer Overflow via Environment Variables |
CAPEC-11 |
Cause Web Server Misclassification |
CAPEC-13 |
Subverting Environment Variable Values |
CAPEC-14 |
Client-side Injection-induced Buffer Overflow |
CAPEC-18 |
Embedding Scripts in Non-Script Elements |
CAPEC-24 |
Filter Failure through Buffer Overflow |
CAPEC-25 |
Forced Deadlock |
CAPEC-26 |
Leveraging Race Conditions |
CAPEC-27 |
Leveraging Race Conditions via Symbolic Links |
CAPEC-28 |
Fuzzing |
CAPEC-29 |
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-30 |
Hijacking a Privileged Thread of Execution |
CAPEC-31 |
Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 |
Embedding Scripts in HTTP Query Strings |
CAPEC-39 |
Manipulating Opaque Client-based Data Tokens |
CAPEC-47 |
Buffer Overflow via Parameter Expansion |
CAPEC-53 |
Postfix, Null Terminate, and Backslash |
CAPEC-62 |
Cross Site Request Forgery |
CAPEC-64 |
Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-65 |
Sniff Application Code |
CAPEC-67 |
String Format Overflow in syslog() |
CAPEC-68 |
Subvert Code-signing Facilities |
CAPEC-69 |
Target Programs with Elevated Privileges |
CAPEC-71 |
Using Unicode Encoding to Bypass Validation Logic |
CAPEC-72 |
URL Encoding |
CAPEC-74 |
Manipulating User State |
CAPEC-76 |
Manipulating Web Input to File System Calls |
CAPEC-77 |
Manipulating User-Controlled Variables |
CAPEC-78 |
Using Escaped Slashes in Alternate Encoding |
CAPEC-79 |
Using Slashes in Alternate Encoding |
CAPEC-96 |
Block Access to Libraries |
CAPEC-100 |
Overflow Buffers |
CAPEC-106 |
Cross Site Scripting through Log Files |
CAPEC-123 |
Buffer Manipulation |
CAPEC-124 |
Shared Data Manipulation |
CAPEC-126 |
Path Traversal |
CAPEC-128 |
Integer Attacks |
CAPEC-129 |
Pointer Manipulation |
CAPEC-139 |
Relative Path Traversal |
CAPEC-141 |
Cache Poisoning |
CAPEC-142 |
DNS Cache Poisoning |
CAPEC-146 |
XML Schema Poisoning |
CAPEC-149 |
Explore for Predictable Temporary File Names |
CAPEC-153 |
Input Data Manipulation |
CAPEC-155 |
Screen Temporary Files for Sensitive Information |
CAPEC-161 |
Infrastructure Manipulation |
CAPEC-162 |
Manipulating Hidden Fields |
CAPEC-163 |
Spear Phishing |
CAPEC-164 |
Mobile Phishing |
CAPEC-165 |
File Manipulation |
CAPEC-166 |
Force the System to Reset Values |
CAPEC-170 |
Web Application Fingerprinting |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-224 |
Fingerprinting |
CAPEC-234 |
Hijacking a privileged process |
CAPEC-235 |
Implementing a callback to system routine (old AWT Queue) |
CAPEC-236 |
Catching exception throw/signal from privileged block |
CAPEC-248 |
Command Injection |
CAPEC-267 |
Leverage Alternate Encoding |
CAPEC-268 |
Audit Log Manipulation |
CAPEC-271 |
Schema Poisoning |
CAPEC-462 |
Cross-Domain Search Timing |
CAPEC-490 |
Amplification |
CAPEC-536 |
Data Injected During Configuration |